another fun translation problem: instead of x and y axes, you have a c1 axis on top of a c2 axis with the two c axes separated by some given r. presumably a spindle is centered the same r away from one of the c's so that a whole xy area of 2r can be reached by rotations of the two c's.
--- On Thu, 6/7/12, andy pugh <[email protected]> wrote: > From: andy pugh <[email protected]> > Subject: Re: [Emc-users] cylindrical coordinate kinematics > To: "Enhanced Machine Controller (EMC)" <[email protected]> > Date: Thursday, June 7, 2012, 6:17 AM > On 7 June 2012 14:00, charles green > <[email protected]> > wrote: > > > i see only two approaches: the rotation axes are > purely for indexing between various angular offsets without > any coordination of other movements (i.e. stay clear of > spinning mechanism), or incorporate the absolute cartesian > positions of the rotation axes into a calculation of > resulting movements. > > The rotary axes typically roatate to reach their endpoint at > the same > time as the linear move. This works fine when there is a > linear move, > but does mean that the feed rate needs to be compensated or > you get > the helical feedrate problem you mentioned. > The simplest way to achieve what is required is to use > "inverse time" > feed rate, where you say how long the cut should take > (presumably > having hand-calculated the actual cut length). > > With the cylindrical kinematics idea being discussed here I > _think_ > that the rotary would be seen as a linear, and the feedrate > calcs > would just work. But I could be wrong. > > -- > atp > If you can't fix it, you don't own it. > http://www.ifixit.com/Manifesto > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's > security and > threat landscape has changed and how IT managers can > respond. Discussions > will include endpoint security, mobile security and the > latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Emc-users mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/emc-users > ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Emc-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/emc-users
